Development of a framework to leverage knowledge management systems to improve security awareness.
暂无分享,去创建一个
[1] H. D. Thomas,et al. SUCCESSFUL KNOWLEDGE MANAGEMENT PROJECTS , 1998 .
[2] Nassim Belbaly,et al. Corporate Portal: A Tool for Knowledge Management Synchronization , 2004, Int. J. Inf. Manag..
[3] Klaus Tochtermann,et al. I-KNOW What You Will Know in Knowledge Management , 2004, PAKM.
[4] Anat Hovav,et al. Deterring internal information systems misuse , 2007, CACM.
[5] Mark B. Desman. Building an Information Security Awareness Program , 2001 .
[6] Iván Arce,et al. The Weakest Link Revisited , 2003, IEEE Secur. Priv..
[7] P. Senge. THE FIFTH DISCIPLINE , 1997 .
[8] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[9] Ricardo de Almeida Falbo,et al. Integrating Knowledge Management and Groupware in a Software Development Environment , 2004, PAKM.
[10] A. Gupta,et al. The first decade of personal computers , 1984, Proceedings of the IEEE.
[11] J. Schweitzer. Security awareness , 1986, PCS '86.
[12] D. Stenmark. Information vs. knowledge: the role of intranets in knowledge management , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[13] G. T. Gangemi,et al. Computer Security Basics , 2006 .
[14] Gustavo Stubrich. The Fifth Discipline: The Art and Practice of the Learning Organization , 1993 .
[15] B. Burmahl. The big picture. , 2000, Health facilities management.
[16] Sebastiaan H. von Solms,et al. Information Security - The Third Wave? , 2000, Comput. Secur..
[17] Andrian Marcus,et al. Data Cleansing: Beyond Integrity Analysis 1 , 2000 .
[18] Eugene Schultz,et al. Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .
[19] Robert Schifreen. Defeating the hacker : a non-technical introduction to computer security , 2006 .
[20] Brian Contos. Column: Insider threat monitoring is enhanced by asset relevance , 2007 .
[21] Confidentiality and security of clinical information in mental health practice , 2002 .
[22] Stephanie Teufel,et al. Analyzing information security culture: increased trust by an appropriate information security culture , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[23] Amanda Andress,et al. Surviving Security: How to Integrate People, Process, and Technology, Second Edition , 2001 .
[24] Mike Kemp. Insider Attacks: Barbarians inside the gates: addressing internal security threats , 2005 .
[25] Diane M. Strong,et al. AIMQ: a methodology for information quality assessment , 2002, Inf. Manag..
[26] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[27] Julie D Nosworthy,et al. Implementing Information Security In The 21st Century Do You Have the Balancing Factors? , 2000, Comput. Secur..
[28] Norbert Gronau,et al. The KMDL Knowledge Management Approach: Integrating Knowledge Conversions and Business Process Modeling , 2004, PAKM.
[29] A. B. Ruighaver,et al. Understanding Organizational Security Culture , 2002 .
[30] 野中 郁次郎,et al. The Knowledge-Creating Company: How , 1995 .
[31] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[32] Verna Allee,et al. 12 Principles of Knowledge Management. , 1997 .
[33] Mathieu Gorge,et al. Cyberterrorism: hype or reality? , 2007 .
[34] Robert S. Swarz,et al. Reliable Computer Systems: Design and Evaluation , 1992 .
[35] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[36] Stefan A. Robila,et al. Don't be a phish: steps in user education , 2006, ITICSE '06.
[37] Gurpreet Dhillon,et al. Managing and controlling computer misuse , 1999, Inf. Manag. Comput. Secur..
[38] Daniel E. O'Leary. Wikis: 'From Each According to His Knowledge' , 2008, Computer.
[39] Ebrahim Randeree,et al. Knowledge management: securing the future , 2006, J. Knowl. Manag..
[40] John Denton. Organisational learning and effectiveness , 1998 .
[41] Mani R. Subramani,et al. A framework of knowledge management systems: issues and challenges for theory and practice , 2000, ICIS.
[42] Peter G. King. Thanks Very Much , 1993 .
[43] Lech J. Janczewski,et al. Managerial guide for handling cyber-terrorism and information warfare , 2005 .
[44] Satish Gupta,et al. Personal Computer Displays , 1987, IEEE Computer Graphics and Applications.
[45] Atreyi Kankanhalli,et al. The role of IT in successful knowledge management initiatives , 2003, CACM.
[46] W. Keith Edwards,et al. Talc: using desktop graffiti to fight software vulnerability , 2008, CHI.
[47] Mark Wilson,et al. SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model , 1998 .
[48] R. Sharp,et al. Internet Safety and Security Surveys - A Review , 2007 .
[49] Alea M. Fairchild. Knowledge management metrics via a balanced scorecard methodology , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[50] M. Crossan. The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation , 1996 .
[51] I. Nonaka. A Dynamic Theory of Organizational Knowledge Creation , 1994 .
[52] Kostas N. Dervitsiotis,et al. The challenge of managing organizational change: Exploring the relationship of re-engineering, developing learning organizations and total quality management , 1998 .
[53] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[54] W. Kim,et al. Fair process: managing in the knowledge economy. , 1997, Harvard business review.
[55] R. McDermott. Why Information Technology Inspired but Cannot Deliver Knowledge Management , 1999 .
[56] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[57] David C. Mowery,et al. Is the Internet a US invention?—an economic and technological history of computer networking , 2002 .
[58] Morten T. Hansen,et al. What's your strategy for managing knowledge? , 1999, Harvard business review.
[59] George Kurtz,et al. Hacking Exposed: Network Security Secrets & Solutions , 1999 .
[60] Denis Trcek. Security Models: Refocusing on the Human Factor , 2006, Computer.
[61] Alan D. Marwick,et al. Knowledge management technology , 2001, IBM Syst. J..
[62] Jean-Grégoire Bernard. A Typology of Knowledge Management System Use by Teams , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[63] Rebecca Herold,et al. Managing an Information Security and Privacy Awareness and Training Program, Second Edition , 2010 .
[64] M. Siegler,et al. Sounding Boards. Confidentiality in medicine--a decrepit concept. , 1982, The New England journal of medicine.
[65] Dorothy E. Leidner,et al. Knowledge Management Systems: Issues, Challenges, and Benefits , 1999, Commun. Assoc. Inf. Syst..
[66] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[67] M. Lynne Markus,et al. Toward A Theory of Knowledge Reuse : Types of Knowledge Reuse Situations and Factors in Reuse Success , 2022 .
[68] Scott McCoy,et al. The most important issues in knowledge management , 2002, CACM.
[69] Salvatore J. Stolfo,et al. Addressing the Insider Threat , 2009, IEEE Security & Privacy Magazine.
[70] Andrian Marcus,et al. Data Cleansing: Beyond Integrity Analysis , 2000, IQ.
[71] Yogesh Malhotra,et al. Integrating knowledge management technologies in organizational business processes: getting real time enterprises to deliver real business performance , 2005, J. Knowl. Manag..
[72] Josephine Chinying Lang,et al. Managerial concerns in knowledge management , 2001, J. Knowl. Manag..
[73] Myra Spiliopoulou,et al. Towards an Evaluation Framework for Knowledge Management Systems , 2004, PAKM.
[74] Etienne Wenger,et al. Situated Learning: Legitimate Peripheral Participation , 1991 .
[75] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.